Types of policies in e-commerce, Computer Engineering

Assignment Help:

1- The Privacy Policy:

The vendor must explain to the customer how all his information especially sensitive ones will be totally private, and no one can read them or use them in any illegal issues.

2- The Security Policy:

The vendor must explain to the customer that the money information will be totally secured, like credit card details, and the customer will be informed when the money for the current operation gets decremented from his balance.

3- The Delivery and Shipping Policy:

The vendor must explain to the customer how and when the purchased products will be delivered, and if there are any charges for the shipment.

4- The Return Policy:

The vendor must explain if the purchased products could be returned or not, and if yes then they could be returned under what conditions, within how many days after the delivery.

5- The Replace or Refund Policy:

The vendor must explain when and how the customer returns the purchased product and the available options he can choose from.

6- Customer Satisfaction Policy:

The vendor must explain to the customer how to guarantee that he will be satisfied with the product or service, and how to measure his satisfaction. Also the vendor must take care of their feedbacks.

7- The Warranty Policy:

The vendor must explain to the customer if the purchased product will be under warranty or not and for how long, and under what conditions.

When a customer decides to purchase a product or to get a service online he should read carefully the policies of the vendor, so he knows how all his rights will be saved, as polices are not standard for all vendors, and not all vendors explain clearly their policies, so the customer must be careful to not be a victim of crooks.


Related Discussions:- Types of policies in e-commerce

Neural network programming using matlab, I need the matlab basics for crea...

I need the matlab basics for creating and configuring a neural network with 2 hidden layers

Determine about the blocking suspicious behaviour, Determine about the bloc...

Determine about the blocking suspicious behaviour The response could be spontaneous and automatic, with an option to generate the alert message manually. The history recorded i

How to set table properties in dreamweaver, Q. How to Set Table Properties ...

Q. How to Set Table Properties in dreamweaver? Now you will use table Property inspector to clear the extra space in navigation buttons table and to add a background color in t

Explain instruction stream and data stream, Instruction Stream and Data Str...

Instruction Stream and Data Stream The term 'stream' indicates to a series or flow of either instructions or data operated on by computer. In the entire cycle of instruction ex

What are the different pieces of the virtual address, What are the differen...

What are the different pieces of the virtual address in a segmented paging? The various pieces of virtual address in a segmented paging are as demonstrated below:

Describe arp message format in brief, Describe ARP message format in brief....

Describe ARP message format in brief.                             0                                        8                                      16

Pc configuration and troubleshooting, You have been asked to become the con...

You have been asked to become the consulting technician for MobTex, a local auto servicing centre. The general manager (Jo) realises that the IT system has evolved over time with l

Explain asymmetric cryptographyand its components, Explain Asymmetric crypt...

Explain Asymmetric cryptographyand its components. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound to a single

What is a privileged instruction, What is a privileged instruction? To ...

What is a privileged instruction? To protect the operating system of a computer from being corrupted by user programs, particular instructions can be executed only whereas the

State about the logic micro-operations, State about the Logic Micro-operati...

State about the Logic Micro-operations These operations are performed on binary data stored in register. For a logic micro-operation each bit of a register is treated as a diff

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd